White Men as Full Diversity Partners co-founder Bill Proudman chats with ITSPmagazine’s Selena Templeton for the Diverse IT podcast about his unique approach to engaging white male business leaders in diversity and inclusion efforts.by Selena Templeton, host of DiverseIT

Eoin Keary, CEO of edgescan, and Sean Martin from ITSPmagazine, catch up in Dublin, Ireland as Eoin shares some of the key findings captured during their latest vulnerability assessment and management research activities.by Sean Martin, host of At The Edge and An InfoSec Life

From the men who stare at goats to the possibility of seeing the gorilla, research has found that leveraging methods from unrelated fields produce breakthroughs. Cybersecurity consultant Rachel Phillips explains why employers would be wise to consider the value of non-traditional skillsets when looking for their next security “genius.”by Rachel Phillips

As more adults flock to online dating sites to meet "the one" they must also exercise caution. A new generation of scammers are setting their traps, creating fake profiles to extort cash and mine personal data from victims.by Scott Waddell

As part of Kabbage’s ongoing effort to help small businesses to be successful, Kabbage recently surveyed more than 800 customers and nearly half (47 percent) plan to invest in cybersecurity products and services in 2018.by Constantina Kokenes

ITSPmagazine is proud to be an official RSA Conference media partner for the 2018 event in San Francisco

This is our second time to partner with RSA Conference to help connect information security and privacy with society, the way we live our lives, and the way we do our jobs.

EXPERT CYBERSECURITY WEBCAST SERIES FOR SMALL AND MEDIUM BUSINESSES

Watch Episode III

Hacking is not a new concept—it’s been around for as long as humans can remember. With each new technology introduced into society, people and businesses find ways to push it to the edge; getting more done, sometimes in new and exciting ways. Yet, at the same time, cybercriminals and other malicious actors are also pushing these same technologies to their own edge. Most business don’t think of the technologies they use in this way. Most only think of the business benefit they will get from their investment. The issue, of course, is that while they are looking at this innocently from their own perspective, cybercriminals are looking for ways to make a buck of their own. History repeats itself, however, and we can—and should—learn from the past. Join us for this webcast as we look back in time to apply the tried-and-true learnings and best practices to today’s business environment.

Most recent chronicles

Sometimes change can be difficult to deal with. With this difficulty comes the potential for some to simply stay put and not pursue their dreams. That's not the case for Bruce Sparks. Rather than sitting back, Bruce chose to pursue his dream and reached out the InfoSec community to get some advice. The community responded.

White Men as Full Diversity Partners co-founder Bill Proudman chats with ITSPmagazine’s Selena Templeton for the Diverse IT podcast about his unique approach to engaging white male business leaders in diversity and inclusion efforts.

For the second year in a row, ITSPmagazine is an official media sponsor for one of the industry's top cybersecurity conferences hosted by the world's largest provider of security events, RSA Conference 2018 in San Francisco, USA.

Eoin Keary, CEO of edgescan, and Sean Martin from ITSPmagazine, catch up in Dublin, Ireland as Eoin shares some of the key findings captured during their latest vulnerability assessment and management research activities.

Chad Loder, former co-founder and VP of engineering at Rapid7 and now co-founder and CEO of Habitu8, connected with Sean Martin to share his views on the recently-exposed "researcher" toolkit aptly referred to as the "automated mass exploiter" and named "AutoSploit."

When web protections fail, you'll want to know when your data is exfiltrated. To address this need, vulnerability management provider, edgescan, offers a recent research project, edgeguard, to the open source community.

Join us to understand how the psyche and upbringing of individuals based on geography and demographics has a fundamentally different mindset to technology than say a ‘born in the tech’ millennial. And what that means to us as solution providers and consumers as we are confronted with a billion tech styled tools in our ‘connected’ universe.

ITSPmagazine's Marco Ciappelli and Sean Martin connect with science fiction author, entrepreneur, journalist and freedom fighter(with the EFF) for a safe and open Internet, Cory Doctorow, before his AppSec California Keynote in Santa Monica.

In these Their Story podcasts, Richard Greenberg, the OWASP Los Angeles chapter president, and Rahim Jina from Edgescan, connect with Sean Martin to provide an update on the upcoming 2018 AppSec California conference being held January 28th to the 31st in Santa Monica, California.

There has been a lot of noise over the new Net Neutrality law and what it means to us as consumers, small/medium businesses, and large enterprises. In this new chronicle, Ashwin Krishnan sheds some light on this controversial topic based using an analogy that we all understand: our Uber rides. Love it or hate it you can’t ignore it.

With the new net-neutrality rules finally in play, there is a lot of fear, uncertainty, and doubt. Looking at this from a security perspective, Ashwin Krishnan suggests a re-title for an article from 2010: ‘The Internet is dead. Long live the big 7 and their intermediaries.’

Carbon Black security strategist Rick McElroy chats with ITSPmagazine’s Selena Templeton for An InfoSec Life about the industry-wide phenomenon that no one is talking about: defender fatigue – part 3.

Tune in to hear Rick talk about the praise and rewards we laud on people in the InfoSec industry for negative behavior that ultimately can damage them physically or mentally, how it behooves you as a leader to create an environment that keeps your team healthy, and what his “oh f#@k” moment was when he knew he needed to change his lifestyle.

There is room – both on the consumer and the enterprise side – to become the Zappos, Patagonia brands of the security industry – brands that have a loyal following because of their extreme customer centricity. And now with extensive datasets and machine learning technologies available, it is time to use this not just for upsell but also for ethical sell.

Most recent contributions

As technology works to make our lives easier, the downside is there are more ways than ever to become the victim of fraud. Fraudulent activity can destroy your identity, reputation, finances and much more. The good news is there are ways to protect yourself and stay safe.

As more adults flock to online dating sites to meet "the one" they must also exercise caution. A new generation of scammers are setting their traps, creating fake profiles to extort cash and mine personal data from victims.

Although Bitcoin price dropped substantially this month, cryptocurrencies still attract myriads of swindlers like honey attracts bees. As new waves of users rush into crypto, there will certainly be scammers waiting for them.

The scariest attacks of 2017 don’t have a name. They are not featured in the headlines. They are the unreported and the under-reported. The cyber criminals are not undefeatable supernatural, evil entities.

There are many issues confounding and complicating raising the next generation of technologists. Seven myths exist about technology careers discourage potential teenage technologists and their parents. As a leader of a philanthropic organization dedicated to creating on-ramps to tech careers, Charles Eaton considers busting those myths not only a duty, but a pleasure. Charles tackles these seven myths one-by-one here in his latest ITSPmagazine Experts Corner.

From the men who stare at goats to the possibility of seeing the gorilla, research has found that leveraging methods from unrelated fields produce breakthroughs. Cybersecurity consultant Rachel Phillips explains why employers would be wise to consider the value of non-traditional skillsets when looking for their next security “genius.”

As part of Kabbage’s ongoing effort to help small businesses to be successful, Kabbage recently surveyed more than 800 customers and nearly half (47 percent) plan to invest in cybersecurity products and services in 2018.

Welcome to the last of our three-part GDPR series. In this post we’ll dive deeper into a few more key concepts, like individual rights, data controllers vs. data processors (and how you can determine which one you are), and the new 72-hour rule for data breach reporting.

We’re only a few weeks into 2018, but it’s already feeling a lot like last year for security experts. Here's how to determine whether your SMB needs a cybersecurity overhaul in 2018, and how to actually keep your security resolutions throughout the year.

From stolen emails to hacked credit reports to acts of industrial espionage we never hear about and now processor vulnerabilities, data breaches can cripple organizations, compromise customers, invite regulation and destroy systemic confidence. Will 2018 be the year when new approaches finally result in the number of breaches leveling off?

On May 25, 2016, the GDPR (General Data Protection Regulation) became law in 28 European countries, marking the arrival of the biggest piece of legislation ever created on a Global scale. We are now rapidly approaching the date when enforcement of the new law will commence in 2018. The most important and significant thing to remember about the regulation is its global scope — this means that wherever you are in the world, if you hold or process personal data of Europeans, then you and your company must comply.

One might never think that Cisco would be involved with wearable tech, never mind breast cancer – but a movie? The film tells the story of a startup that seeks to bring a medical product to market - a product that is connected to the Internet and driven by big data.

Despite the advances in technology, there’s still a very human element to whether a company embraces security practices. This article examines the impact that organizational culture has on a company's ability to adopt a security-driven mindset and offers some pragmatic tips on overcoming oft-encountered challenges.

Cybercrime is on the rise. The number of data breaches in 2017 was staggering and things are likely to get worse. Employee error, employee manipulation, hacking-as-a-service, and the gap between development and test make things even more challenging. Says Dr. Rao Papolu, it's time to take some time to assess the main threats to your cyber defenses.

ITSP Webinars

From a partnership with BrightTALK, a brand new approach to bring our readers to the Intersection of IT Security & Society.

We are also planning and working on more webinars, podcast interviews, and a variety of conversations with the cybersecurity experts you want to hear from. We are even scheduling some live TV panels from Black Hat 2017.

Hacking is not a new concept—it’s been around for as long as humans can remember. With each new technology introduced into society, people and businesses find ways to push it to the edge; getting more done, sometimes in new and exciting ways.